Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2727))
Included in the following conference series:
4699Accesses
Abstract
This paper introduces weaknesses of two robust Mix-nets proposed in [10] and [7]. First, we show that [10] can lose anonymity inthe presence of a malicious user even though all servers are honest. Second, we show that [7] can lose anonymity through the collaboration of a malicious user and the first server. The user can identify the plaintextsent from the targeted user by invoking two mix sessions at the risk of the colluding server receiving an accusation. We also point out that in acertain case, anonymity is violated solely by the user without colluding to any server. Practical repairs are provided for both schemes. Since such flaws are due to their weak security definitions, we present a stronger security definition by regarding a Mix-net as a batch decryption algorithm of a CCA secure public-key encryption scheme.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abe.Efficient Components for Cryptographic Applications in the Discrete-Log Setting. PhD thesis, University of Tokyo, 2002.
M. Abe and F. Hoshino. Remarks on mix-network based on permutation network. In K. Kim, editor,PKC 2001, volume 1992 ofLecture Notes in Computer Science, pages 317–324. Springer-Verlag, 2001.
R. Canetti. Security and composition of multiparty cryptographic protocols.Journal of Cryptology, 13(1):143–202, Winter 2000.
D. L. Chaum. Untraceable electronic mail, return address, and digital pseudonyms.Communications of the ACM, 24:84–88, 1981.
Y. Desmedt and K. Kurosawa. How to break a practical MIX and design a new one. In Bart Preneel, editor,Advances in Cryptology — EUROCRYPT 2000, volume 1807 ofLecture Notes in Computer Science, pages 557–572. Springer-Verlag, 2000.
J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In J. Killian, editor,Advances in Cryptology — Crypto 2001, volume 2139 ofLecture Notes in Computer Science, pages 368–387. Springer-Verlag, 2001.
P. Golle, S. Zhong, D. Boneh, M. Jakobsson, and A. Juels. Optimistic mixing for exit-polls. In Y. Zheng, editor,Advances in Cryptology — Asiacrypt 2002, volume 2501 ofLecture Notes in Computer Science, pages 451–465. Springer-Verlag, 2002.
H. Handschuh, Y. Tsiounis, and M. Yung. Decision oracles are equivalent to matching oracles. In H. Imai and Y. Zheng, editors,Second International Workshop on Practice and Theory in Public Key Cryptography, volume 1560 ofLecture Notes in Computer Science, pages 276–289. Springer-Verlag, 1999.
M. Jakobsson. A practical mix. In K. Nyberg, editor,Advances in Cryptology — EUROCRYPT’ 98, volume 1403 ofLecture Notes in Computer Science, pages 448–461. Springer-Verlag, 1998.
A. Juels and M. Jakobsson. An optimally robust hybrid mix network. InProceedings of the 20thannual ACM Symposium on Principles of Distributed Computation, 2001.
A. Neff. A verifiable secret shuffle and its application to e-voting. InACM CCS’01, pages 116–125. ACM, 2001.
M. Ohkubo and M. Abe. A length-invariant hybrid mix. In T. Okamoto, editor,Advances in Cryptology — ASIACRYPT 2000, volume 1976 ofLecture Notes in Computer Science, pages 178–191. Springer-Verlag, 2000.
B. Pfitzmann. Breaking an efficient anonymous channel. In Alfredo De Santis, editor,Advances in Cryptology — EUROCRYPT’ 94, volume 950 ofLecture Notes in Computer Science, pages 339–348. Springer-Verlag, 1995.
K. Sako and J. Killian. Receipt-free mix-type voting scheme — a practical solution to the implementation of a voting booth —. In L. C. Guillou and J.-J. Quisquater, editors,Advances in Cryptology — EUROCRYPT’ 95, volume 921 ofLecture Notes in Computer Science, pages 393–403. Springer-Verlag, 1995.
C. P. Schnorr and M. Jakobsson. Security of signed Elgamal encryption. In T. Okamoto, editor,Advances in Cryptology — ASIACRYPT 2000, volume 1976 ofLecture Notes in Computer Science, pages 73–89. Springer-Verlag, 2000.
D. Wikström. Four practical attacks for “optimistic mixing for exit-polls”. Technical Report SICS-T-2003/04-SE, Swedish Institute of Computer Science (SICS), February 2003. (Preliminary SICS-T-2002/24-SE, Dec. 2002).
Author information
Authors and Affiliations
NTT Laboratories, Japan
Masayuki Abe
Information & Systems, Institute of Industrial Science, University of Tokyo, Tokyo
Hideki Imai
- Masayuki Abe
You can also search for this author inPubMed Google Scholar
- Hideki Imai
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
School of Information Technology and Computer Science, University of Wollongong, Wollongong, NSW, 2522, Australia
Rei Safavi-Naini & Jennifer Seberry &
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abe, M., Imai, H. (2003). Flaws in Some Robust Optimistic Mix-Nets. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_4
Download citation
Published:
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-40515-3
Online ISBN:978-3-540-45067-2
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative